Vulnerabilities > CVE-2015-6125 - DNS Use After Free Remote Code Execution vulnerability in Microsoft Windows Server 2008 and Windows Server 2012

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
microsoft
critical
nessus

Summary

Use-after-free vulnerability in the DNS server in Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted requests, aka "Windows DNS Use After Free Vulnerability." <a href="https://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>

Msbulletin

bulletin_idMS15-127
bulletin_url
date2015-12-08T00:00:00
impactRemote Code Execution
knowledgebase_id3100465
knowledgebase_url
severityCritical
titleSecurity Update for Microsoft Windows DNS to Address Remote Code Execution

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS15-127.NASL
descriptionThe remote Windows host is affected by a remote code execution vulnerability in the Windows Domain Name System (DNS) server due to improper parsing of DNS requests. A remote attacker can exploit this, via specially crafted DNS requests, to execute arbitrary code in the context of the Local System Account.
last seen2020-06-01
modified2020-06-02
plugin id87256
published2015-12-08
reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/87256
titleMS15-127: Security Update for Microsoft Windows DNS to Address Remote Code Execution (3100465)